Mercurial > illumos > illumos-gate
diff usr/src/lib/pkcs11/pkcs11_kms/common/kmsDualCrypt.c @ 12720:3db6e0082404
PSARC 2010/195 PKCS11 KMS Provider
6944296 Solaris needs a PKCS#11 provider to allow access to KMS keystore functionality
author | Wyllys Ingersoll <Wyllys.Ingersoll@Sun.COM> |
---|---|
date | Mon, 28 Jun 2010 16:04:11 -0700 |
parents | |
children |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/usr/src/lib/pkcs11/pkcs11_kms/common/kmsDualCrypt.c Mon Jun 28 16:04:11 2010 -0700 @@ -0,0 +1,74 @@ +/* + * CDDL HEADER START + * + * The contents of this file are subject to the terms of the + * Common Development and Distribution License (the "License"). + * You may not use this file except in compliance with the License. + * + * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE + * or http://www.opensolaris.org/os/licensing. + * See the License for the specific language governing permissions + * and limitations under the License. + * + * When distributing Covered Code, include this CDDL HEADER in each + * file and include the License file at usr/src/OPENSOLARIS.LICENSE. + * If applicable, add the following below this CDDL HEADER, with the + * fields enclosed by brackets "[]" replaced with your own identifying + * information: Portions Copyright [yyyy] [name of copyright owner] + * + * CDDL HEADER END + */ + +/* + * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. + */ + + +#include <security/cryptoki.h> +#include "kmsGlobal.h" + +/*ARGSUSED*/ +CK_RV +C_DigestEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, + CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, + CK_ULONG_PTR pulEncryptedPartLen) +{ + if (!kms_initialized) + return (CKR_CRYPTOKI_NOT_INITIALIZED); + + return (CKR_FUNCTION_NOT_SUPPORTED); +} + +/*ARGSUSED*/ +CK_RV +C_DecryptDigestUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, + CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) +{ + if (!kms_initialized) + return (CKR_CRYPTOKI_NOT_INITIALIZED); + + return (CKR_FUNCTION_NOT_SUPPORTED); +} + +/*ARGSUSED*/ +CK_RV +C_SignEncryptUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pPart, + CK_ULONG ulPartLen, CK_BYTE_PTR pEncryptedPart, + CK_ULONG_PTR pulEncryptedPartLen) +{ + if (!kms_initialized) + return (CKR_CRYPTOKI_NOT_INITIALIZED); + + return (CKR_FUNCTION_NOT_SUPPORTED); +} + +/*ARGSUSED*/ +CK_RV +C_DecryptVerifyUpdate(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pEncryptedPart, + CK_ULONG ulEncryptedPartLen, CK_BYTE_PTR pPart, CK_ULONG_PTR pulPartLen) +{ + if (!kms_initialized) + return (CKR_CRYPTOKI_NOT_INITIALIZED); + + return (CKR_FUNCTION_NOT_SUPPORTED); +}